JavacoolSoftware, the maker of Spywareblaster, recommend you uninstall the previous version before upgrading to the new one.
Drift in the wind.
I completed the first two installations of Vista SP1 RTM upgrade last night on to my primary desktop computer and my first Vista laptop meant to be my new work computer. The result is a near death experience with my desktop computer, and then a real death experience with the laptop
Despite the Service Pack, Vista still doesn't correctly handle backup archives which were generated with its predecessor Windows XP. There is no noticeable improvement to notebook battery life either. When tested one notebook only ran for half as long as when running Windows XP. Eight further notebooks didn't run differently in the c't test. There even were some entirely new issues, for example with virus scanners. Norton Antivirus produces error messages, and Bitdefender Antivirus can't be installed any more at all.
Update has been pulled from Windows Update, but Microsoft has not yet produced a fix for users whose machines either won't boot or reboot constantly... Responding to reports of endlessly rebooting PCs that flooded support newsgroups last week, Microsoft said on Tuesday it had pulled an update designed to prep Windows Vista for Service Pack 1.
The new release remedies three security vulnerabilities, one of which allows attackers to manipulate file input dialogues. When users enter a file name, attackers can cause certain input to be suppressed. As a result, users might upload a file they were not expecting.
Using a MouseEvent – dispatchEvent, a "click" can be sent to an HTML file input element, allowing user input to be selectively captured. This could allow an attacker to construct an arbitrary file path that is subsequently used to upload a file of the attacker's choosing.
Opera has categorised the problem as only moderately dangerous. Nonetheless, the Norwegians were upset when Mozilla informed them of the flaw just one day before making the news public. The flaw has already been remedied in Firefox and SeaMonkey.
Another flaw can be exploited in cross-site scripting attacks, and a third can be used to execute arbitrary scripts via image properties. For more details, see the Opera change log.
|November 2013January 2014|